cve-2025-20119
Vulnerability from cvelistv5
Published
2025-02-26 16:23
Modified
2025-03-03 19:02
Summary
Cisco Application Policy Infrastructure Controller Authenticated Local Denial of Service Vulnerability
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20119",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-26T17:21:01.401418Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-03T19:02:59.455Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Application Policy Infrastructure Controller (APIC)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2(8d)"
            },
            {
              "status": "affected",
              "version": "3.2(1m)"
            },
            {
              "status": "affected",
              "version": "3.2(5e)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "3.2(41d)"
            },
            {
              "status": "affected",
              "version": "3.2(3s)"
            },
            {
              "status": "affected",
              "version": "4.0(3c)"
            },
            {
              "status": "affected",
              "version": "4.1(1k)"
            },
            {
              "status": "affected",
              "version": "3.2(4d)"
            },
            {
              "status": "affected",
              "version": "4.2(2e)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.1(1l)"
            },
            {
              "status": "affected",
              "version": "3.2(9f)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "3.2(7k)"
            },
            {
              "status": "affected",
              "version": "3.2(9b)"
            },
            {
              "status": "affected",
              "version": "3.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(2u)"
            },
            {
              "status": "affected",
              "version": "4.2(1l)"
            },
            {
              "status": "affected",
              "version": "4.1(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(3d)"
            },
            {
              "status": "affected",
              "version": "3.2(4e)"
            },
            {
              "status": "affected",
              "version": "4.1(1i)"
            },
            {
              "status": "affected",
              "version": "3.2(5f)"
            },
            {
              "status": "affected",
              "version": "3.2(1l)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.1(2o)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "3.2(6i)"
            },
            {
              "status": "affected",
              "version": "3.2(3i)"
            },
            {
              "status": "affected",
              "version": "3.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.1(2x)"
            },
            {
              "status": "affected",
              "version": "3.2(5d)"
            },
            {
              "status": "affected",
              "version": "4.2(3q)"
            },
            {
              "status": "affected",
              "version": "4.1(1j)"
            },
            {
              "status": "affected",
              "version": "4.1(2w)"
            },
            {
              "status": "affected",
              "version": "3.2(2o)"
            },
            {
              "status": "affected",
              "version": "3.2(3r)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.1(2s)"
            },
            {
              "status": "affected",
              "version": "3.2(7f)"
            },
            {
              "status": "affected",
              "version": "3.2(3o)"
            },
            {
              "status": "affected",
              "version": "3.2(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(4i)"
            },
            {
              "status": "affected",
              "version": "3.2(9h)"
            },
            {
              "status": "affected",
              "version": "5.0(1k)"
            },
            {
              "status": "affected",
              "version": "4.2(4k)"
            },
            {
              "status": "affected",
              "version": "5.0(1l)"
            },
            {
              "status": "affected",
              "version": "5.0(2e)"
            },
            {
              "status": "affected",
              "version": "4.2(4o)"
            },
            {
              "status": "affected",
              "version": "4.2(4p)"
            },
            {
              "status": "affected",
              "version": "5.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.2(5k)"
            },
            {
              "status": "affected",
              "version": "4.2(5l)"
            },
            {
              "status": "affected",
              "version": "4.2(5n)"
            },
            {
              "status": "affected",
              "version": "5.1(1h)"
            },
            {
              "status": "affected",
              "version": "4.2(6d)"
            },
            {
              "status": "affected",
              "version": "5.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.2(6g)"
            },
            {
              "status": "affected",
              "version": "4.2(6h)"
            },
            {
              "status": "affected",
              "version": "5.1(3e)"
            },
            {
              "status": "affected",
              "version": "3.2(10e)"
            },
            {
              "status": "affected",
              "version": "4.2(6l)"
            },
            {
              "status": "affected",
              "version": "4.2(7f)"
            },
            {
              "status": "affected",
              "version": "5.1(4c)"
            },
            {
              "status": "affected",
              "version": "4.2(6o)"
            },
            {
              "status": "affected",
              "version": "5.2(1g)"
            },
            {
              "status": "affected",
              "version": "5.2(2e)"
            },
            {
              "status": "affected",
              "version": "4.2(7l)"
            },
            {
              "status": "affected",
              "version": "3.2(10f)"
            },
            {
              "status": "affected",
              "version": "5.2(2f)"
            },
            {
              "status": "affected",
              "version": "5.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(7q)"
            },
            {
              "status": "affected",
              "version": "5.2(2h)"
            },
            {
              "status": "affected",
              "version": "5.2(3f)"
            },
            {
              "status": "affected",
              "version": "5.2(3e)"
            },
            {
              "status": "affected",
              "version": "5.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.2(7r)"
            },
            {
              "status": "affected",
              "version": "4.2(7s)"
            },
            {
              "status": "affected",
              "version": "5.2(4d)"
            },
            {
              "status": "affected",
              "version": "5.2(4e)"
            },
            {
              "status": "affected",
              "version": "4.2(7t)"
            },
            {
              "status": "affected",
              "version": "5.2(5d)"
            },
            {
              "status": "affected",
              "version": "3.2(10g)"
            },
            {
              "status": "affected",
              "version": "5.2(5c)"
            },
            {
              "status": "affected",
              "version": "6.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.2(7u)"
            },
            {
              "status": "affected",
              "version": "5.2(5e)"
            },
            {
              "status": "affected",
              "version": "5.2(4f)"
            },
            {
              "status": "affected",
              "version": "5.2(6e)"
            },
            {
              "status": "affected",
              "version": "6.0(1j)"
            },
            {
              "status": "affected",
              "version": "5.2(6g)"
            },
            {
              "status": "affected",
              "version": "5.2(7f)"
            },
            {
              "status": "affected",
              "version": "4.2(7v)"
            },
            {
              "status": "affected",
              "version": "5.2(7g)"
            },
            {
              "status": "affected",
              "version": "6.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.2(7w)"
            },
            {
              "status": "affected",
              "version": "5.2(6h)"
            },
            {
              "status": "affected",
              "version": "5.2(4h)"
            },
            {
              "status": "affected",
              "version": "5.2(8d)"
            },
            {
              "status": "affected",
              "version": "6.0(2j)"
            },
            {
              "status": "affected",
              "version": "5.2(8e)"
            },
            {
              "status": "affected",
              "version": "6.0(3d)"
            },
            {
              "status": "affected",
              "version": "6.0(3e)"
            },
            {
              "status": "affected",
              "version": "5.2(8f)"
            },
            {
              "status": "affected",
              "version": "5.2(8g)"
            },
            {
              "status": "affected",
              "version": "5.3(1d)"
            },
            {
              "status": "affected",
              "version": "5.2(8h)"
            },
            {
              "status": "affected",
              "version": "6.0(4c)"
            },
            {
              "status": "affected",
              "version": "5.3(2a)"
            },
            {
              "status": "affected",
              "version": "5.2(8i)"
            },
            {
              "status": "affected",
              "version": "6.0(5h)"
            },
            {
              "status": "affected",
              "version": "5.3(2b)"
            },
            {
              "status": "affected",
              "version": "6.0(3g)"
            },
            {
              "status": "affected",
              "version": "6.0(5j)"
            },
            {
              "status": "affected",
              "version": "5.3(2c)"
            },
            {
              "status": "affected",
              "version": "6.0(6c)"
            },
            {
              "status": "affected",
              "version": "6.1(1f)"
            },
            {
              "status": "affected",
              "version": "6.0(7e)"
            },
            {
              "status": "affected",
              "version": "5.3(2d)"
            },
            {
              "status": "affected",
              "version": "6.0(8d)"
            },
            {
              "status": "affected",
              "version": "5.3(2e)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-362",
              "description": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-26T17:13:44.068Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-apic-multi-vulns-9ummtg5",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5"
        }
      ],
      "source": {
        "advisory": "cisco-sa-apic-multi-vulns-9ummtg5",
        "defects": [
          "CSCwk18865"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Application Policy Infrastructure Controller Authenticated Local Denial of Service Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20119",
    "datePublished": "2025-02-26T16:23:37.170Z",
    "dateReserved": "2024-10-10T19:15:13.211Z",
    "dateUpdated": "2025-03-03T19:02:59.455Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-20119\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-02-26T17:15:22.883\",\"lastModified\":\"2025-07-31T17:40:38.413\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\\r\\n\\r\\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la gesti\u00f3n de permisos de archivos del sistema de Cisco APIC podr\u00eda permitir que un atacante local autenticado sobrescribiera archivos cr\u00edticos del sistema, lo que podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, el atacante debe tener credenciales administrativas v\u00e1lidas. Esta vulnerabilidad se debe a una condici\u00f3n de ejecuci\u00f3n con la gesti\u00f3n de archivos del sistema. Un atacante podr\u00eda explotar esta vulnerabilidad al realizar operaciones espec\u00edficas en el sistema de archivos. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante sobrescribir archivos del sistema, lo que podr\u00eda hacer que el dispositivo est\u00e9 en un estado inconsistente y causar una condici\u00f3n de denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98F6DE0-E0BB-4964-8A05-C65F5165621B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(1m\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70E3895-DCB3-4172-B98C-6E40F0A4F418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(2l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD7459-DE32-4CCD-8FD9-E51E78F5E6A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(2o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB7047CE-3246-4148-A976-816F52955EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195681EC-2C51-4E03-9D6B-98775F91CCDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2159857F-B8BA-4C08-B3B0-F94D391A6396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3n\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3110702B-17B0-4CC0-ACF1-373E46B434B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DC07AC-B0E9-4963-843E-FFA9461FFBB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3r\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D0E93D-8D70-4232-85B5-916DF9094FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3s\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43499579-9B0B-439E-8E75-18E7B42799FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(4d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F5A4B6-B2E7-419F-A051-CBA3EC4A36C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(4e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FEF58C-6E55-4B50-A26A-0D6CC162572B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(5d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD7A2FE-4858-4929-98CF-D830D5ADC570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(5e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6ABA87-08F5-4C89-B0A2-D209B6305E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(5f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01076AAB-79F9-40B8-BE1F-411EED87867A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(6i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76E4E4F2-9567-471E-AC73-5CD6AD338C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(7f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEAD3085-3271-4E28-9E55-2ED813D796F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(7k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80ADB11A-4D8C-4C2D-A483-E5BCD0B52B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(8d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF518C44-E1F8-4443-9D73-D620158E7946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(9b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569D4548-EE9D-4F33-A6EE-21A7ADF2514E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(9f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F2A714-DA33-449E-9C99-C8D8C15647D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(9h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A36D5184-55D1-4CBA-91BC-5E077FB07E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(10e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D155016D-6988-4489-A4A1-BFDFB8F702A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(10f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C036D5F-67EE-45CE-8D47-2BF483A14922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(10g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B468C9AE-396E-445B-AC5D-EAB1BB8EDFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(41d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3686F336-5D02-4984-B465-762EA7AB747D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(1h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2A1A67-093B-4B8D-92EC-74BBDEDC91AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(2c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D53DB7-C376-481B-9FF5-745290EE2F4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(3c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A59205CF-AB56-4902-BE58-2823B432A32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF203A26-8EE3-4570-89EB-2C06F228222D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0530224D-F85F-41CD-ADF9-29DF060C3BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807B4B19-7346-4F9A-AC07-ACC9F1AE145E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5775342D-C7A7-454E-BE3C-D0BF0C045C20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9496DBE9-0688-49F4-9A13-6AB427BB3663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DFEF7C4-26F5-4F58-9063-811247E40EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9863BBC-56C8-44FC-B30A-5D12C74B3779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2m\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E54667F-863C-4FC7-8DF2-5515D6766B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D1B627-4C61-4A86-8C39-D5C1152F0EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2s\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"632F2791-A9E9-4902-9F5F-51F5D8A025AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2u\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"511B92C9-9E6D-4919-9CF3-BCAE7802B5A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2w\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D2E5F9-6A86-4F9A-9E71-BA682301D1AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2x\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"706A76CD-F18D-4B95-B996-B0160A91CD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46CDDD7F-018A-4AD7-BBE2-F8602F2BA931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47A6A0E-84B9-4DE4-98EB-1065E18C2D2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA157F60-606D-4A5C-8437-D7970C7FA8D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87ED09DD-8305-4CF9-B174-644AC585C92B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF98D3C8-A0C6-46EA-9B62-3850868B36A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(2f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD24A82-0BF7-4B90-BA36-BD6AB204304B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(2g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA99D3C-21C0-4432-AE97-8F750C8D4D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"095A0E88-E216-4070-A458-8ED6041469B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E0FDA1-5C75-4683-B24C-4486EC7E3E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3n\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD0F519-2B3B-4AF1-BC30-12B8F5F0F54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3q\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8376ED28-4A53-4E54-94C2-B1C2A744729B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"961D987E-71F7-4CF4-BDAA-0B6ABDEF05D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A584271A-0F2B-4B55-A14B-FA55BC8BD981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D87AD83-B69E-4C79-9362-984FBD4096B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4p\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3930A258-9C03-49E0-B935-136847EF05E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(5k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7821B4A2-FFF5-4E2E-B360-9000DD0A1980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(5l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08254391-0BEC-4110-8AAF-44B66E76569B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(5n\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8CCC02-5269-47CA-9DEE-FB9DF0AEAC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB6B9B5-9B85-49FC-83F6-3CD2C3B92D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5627AF1-FB65-44F1-A7E2-98D6B2767887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF23AD6E-B875-4895-BC82-EA6305927487\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8418157-E12F-4F97-9FAE-601C9BE25D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"270B4C0E-796A-43B3-B3BE-D8C0DF0C0F3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9FDB03C-8B6F-46B2-930A-BD105E41D2FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA2AA37-6DA9-43D8-9D21-E1ECED85A509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7q\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5088B144-3349-4E6F-8978-B96FA7AC420F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7r\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08791B2A-6B2F-4BAE-9E9B-0B2E5F8B610D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7s\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3067079-4CE4-4F29-BFDB-2CDACD003BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7t\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC183AB-16F7-4C43-8F2F-F7508005A82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7u\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB58D50B-68C3-40A3-8E0C-151511E22978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7v\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"693E0E3A-0AA3-4556-930F-79A13A4506ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7w\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0875EE60-A0CE-44C2-AE3A-42BF383BA710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(1k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B412D14-9F6F-4608-8CF8-3AE74A694BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB19FC9F-C52E-48B5-B6F5-5B39F016DC18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"091E80DF-2FCF-466D-8D41-A6F5513C0180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(2h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BBC0EE-5C05-4E88-95CC-2FEB7ABE95C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(1h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7587DDE3-79E4-4A7A-B02D-D407B99B6CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4E68E4-7893-4DC3-9464-03689AEBB2BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(3e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DE195AC-67AA-45CD-8F81-96B5B4859869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(4c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35BFCBA5-DDA2-4DC6-BD12-CF1D58CB73F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(1g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92295C80-3DEB-47C8-A26F-CFA156C88B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9A687B-642A-4646-A85C-8F5C41B8CD15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697D5222-9FDC-430A-B4AD-18C43606B59B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ABB3875-2D9B-4EF5-9DF5-0E7C2E180167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D660DE6-B3F1-498D-9F0C-919D4FD81913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(3e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BEE0A24-B301-4693-965B-9EDF4FB3E652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(3f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"832E8780-1C4F-42EE-B3DB-C36D5C39330A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(3g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0E35AD-664F-4A1B-A651-9A6D6699133E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B487C5E8-FCDB-4EDC-85A0-69B9143B8C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DA2E2F-D519-46E1-AF0F-1B068EE8CF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19E2370A-EDBD-4F39-9AA2-BB1B48DBC6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13102E2-A4B5-4E8E-AFBF-7D2824DF07D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(5c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E304F25-6F50-4C86-B488-F3CB80601FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(5d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56BE783-4995-4EE9-90C8-6BAE73588A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(5e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE12D57D-B08E-46DE-9048-F608B1D0432A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(6e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DD76D9-2703-40AF-B154-9F3A268473D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(6g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AFA2721-32D2-4877-BCAB-8E965AAB0B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(6h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC4FB4EB-87BE-4A1B-AB68-9B12F2372090\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(7f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8638CF95-3422-4F8D-AE5D-FF7F76BFC456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(7g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857F16AE-D927-44E8-B268-F7A2FC4503B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B178BD85-E906-4D5E-9710-22C394038EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7D76A6-9CEF-4E74-A991-37725A46A045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"224C813A-61E2-4FE7-A012-8C50D90CB633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D57E315-9795-4AB2-A36D-1979AA3B65E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"010B771A-30B2-4892-B028-08C9AEC170BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AEA808-C9C3-4C54-A717-6FB3BC4A32EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(1d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3ED35C-255F-43D3-A9A9-81AAEA1F3AFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1284FC-805B-4C57-931A-BA422A648777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD6BCF2-81B0-4118-9C34-55AEFFAB62BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCD0606-F883-469B-BA82-B372B2F33D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F69DA2D-379F-437A-9284-B5C98BC9F94D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1FF93B-35F0-4CA9-8A7F-4B4B732A81D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(1g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7699F8E-2A17-421E-8078-7EBECE7C2768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(1j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C01F1006-7409-459F-A947-7D68D483CCC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(2h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7839A222-2CC0-495D-97E6-2421BFB0B948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(2j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F64391-5096-478C-A955-169F4AEBDC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF29E5EB-2497-4136-9BC7-7E75A6180245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(3e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7CC4CE-1FF6-45BB-AAC7-367593586AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(3g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64CFF745-E48F-44B9-8C22-12644F0FF06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(4c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97954FE9-2CBF-4016-8FDD-CE7423A65BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(5h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6714932-BC33-41D0-8032-7ED387C6F80C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(5j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23C425D3-CF4A-4D2D-9FD6-E7B9A9927ED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(6c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91678F6-6BF7-4158-9FBD-6C439BE54D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(7e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"291A6AB2-121A-49AE-94E0-C9A76A87D48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(8d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4E7075-9EFE-4573-A5E5-F15E622A16A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.1\\\\(1f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B3DA1C0-01DB-4773-81EC-A8574030FC59\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.